CVE-2026-27785: CWE-798 in Milesight MS-Cxx63-PD
Specific firmware versions of Milesight AIOT camera firmware contain hard-coded credentials.
AI Analysis
Technical Summary
CVE-2026-27785 is a vulnerability in specific firmware versions of the Milesight MS-Cxx63-PD AIOT camera where hard-coded credentials are present. This weakness (CWE-798) can allow unauthorized access if an attacker can leverage these embedded credentials. The CVSS 4.0 base score is 7.7, reflecting a high severity due to the potential impact on confidentiality, integrity, and availability. The vulnerability is not related to cloud services and no official remediation level or patch has been documented in the available data.
Potential Impact
The presence of hard-coded credentials in the affected firmware versions can lead to unauthorized access to the device, potentially compromising the confidentiality, integrity, and availability of the camera and its data. This could allow attackers to bypass authentication controls without user interaction or privileges. However, no known exploits in the wild have been reported to date.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, users should consider mitigating risk by restricting network access to the affected devices, disabling unnecessary services, or replacing devices with updated firmware once available. Monitor official Milesight communications for updates on patches or mitigations.
CVE-2026-27785: CWE-798 in Milesight MS-Cxx63-PD
Description
Specific firmware versions of Milesight AIOT camera firmware contain hard-coded credentials.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27785 is a vulnerability in specific firmware versions of the Milesight MS-Cxx63-PD AIOT camera where hard-coded credentials are present. This weakness (CWE-798) can allow unauthorized access if an attacker can leverage these embedded credentials. The CVSS 4.0 base score is 7.7, reflecting a high severity due to the potential impact on confidentiality, integrity, and availability. The vulnerability is not related to cloud services and no official remediation level or patch has been documented in the available data.
Potential Impact
The presence of hard-coded credentials in the affected firmware versions can lead to unauthorized access to the device, potentially compromising the confidentiality, integrity, and availability of the camera and its data. This could allow attackers to bypass authentication controls without user interaction or privileges. However, no known exploits in the wild have been reported to date.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, users should consider mitigating risk by restricting network access to the affected devices, disabling unnecessary services, or replacing devices with updated firmware once available. Monitor official Milesight communications for updates on patches or mitigations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- icscert
- Date Reserved
- 2026-03-12T17:51:09.903Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69f0134ecbff5d861057a5c3
Added to database: 4/28/2026, 1:54:22 AM
Last enriched: 4/28/2026, 1:54:30 AM
Last updated: 4/28/2026, 5:19:22 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.